Please turn on your JavaScript for this page to function normally.
Do attribution and motives matter?

Whenever people think of APTs and targeted attacks, people ask: who did it? What did they want? While those questions may well be of some interest, we think it is much more …

Most are concerned about security of healthcare data

More than three-fourths (76 percent) of U.S. adults are concerned that their healthcare records are vulnerable to hackers, according to the University of Phoenix.Perhaps not …

Top strategic IT predictions for 2016 and beyond

Gartner’s top predictions for 2016 look at the digital future, at an algorithmic and smart machine-driven world where people and machines must define harmonious …

CIOs agree, IT is more complex than ever

Nine out of ten UK CIOs (93%) believe that IT complexity has increased, according to Trustmarque. The research has revealed that cloud computing (66%), legacy technology (51%) …

New Toshiba CMOS image sensor improves recognition and authentication

In recent years, mobile devices have adopted user authentication systems to protect access and information security. Password entry remains the most common, but finger print …

Fake Android apps bypass Google Play store security

“ESET unveiled fake apps available at the official Google app store. Posing as popular game cheats, such as Cheats for Pou, Guide for SubWay and Cheats for SubWay, these …

Photo: A walk through Cyber Security Europe 2015

Taking place in London this week, Cyber Security Europe 2015 features seminars and solutions on all facets of cyber security and risk mitigation, from perimeter firewalls to …

The average cost of cybercrime escalates to $15 million per organization

A new study by the the Ponemon Institute and HP reveales a dramatic increase in the overall cost of cyber crime. The 2015 Cost of Cyber Crime Study quantifies the annual cost …

How are businesses responding to cyber risks?

Year after year, cyberattacks continue to escalate in frequency, severity and impact. However, prevention, detection methods and cybersecurity innovation are on the rise as …

The impact of digital business on information security

Changes in computing fabric, devices and services formed by digital business continue to shape risk and security landscapes, according to Gartner. By year-end 2017, more than …

Wealth of personal data found on used electronics purchased online

Varying amounts and types of residual data have been found on used mobile devices, hard disk drives and solid state drives purchased online from Amazon, eBay and …

The price of the Internet of Things will be a vague dread of a malicious world

Volkswagen didn’t make a faulty car: they programmed it to cheat intelligently. The difference isn’t semantics, it’s game-theoretical (and it borders on applied demonology). …

Don't miss

Cybersecurity news